|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8079 occurrences of 2235 keywords
|
|
|
Results
Found 25398 publication records. Showing 25398 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
29 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
29 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
29 | Andreas Pashalidis, Chris J. Mitchell |
Using EMV Cards for Single Sign-On. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
authentication, single sign-on, EMV |
29 | Michael Wang, Andrzej M. Goscinski |
The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Identity-based Conference Key Distribution, Distributed Systems, Authentication, Distributed Operating Systems |
29 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
29 | Qi Dong 0001, Donggang Liu, Peng Ning |
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
security, sensor networks, broadcast authentication, DoS attacks |
29 | Hiroyuki Manabe, Masaaki Fukumoto |
AwareLESS authentication: insensible input based authentication. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
awareLESS, finger motion, insensible, authentication, input |
29 | Kianoosh Mokhtarian, Mohamed Hefeeda |
End-to-end secure delivery of scalable video streams. |
NOSSDAV |
2009 |
DBLP DOI BibTeX RDF |
multimedia authentication, secure streaming, video authentication, multimedia security, scalable video |
29 | Arshad Noor |
Identity protection factor (IPF). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key |
29 | Eun-Chul Cha, Hyoung-Kee Choi |
A Study of Performance Improvement in EAP. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
Extensible Authentication Protocol (EAP), Network Access Authentication, Network Security |
29 | Thomas Johansson 0001 |
Bucket Hashing with a Small Key Size. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
bucket hashing, message authentication, software implementations, authentication codes, Universal hash functions |
29 | Martin Leu |
Relative Signatures for Fault Tolerance and their Implementation. |
EDCC |
1994 |
DBLP DOI BibTeX RDF |
relative signatures, relative authentication, fault tolerance, distributed systems, authentication, digital signatures |
29 | Alen Peacock, Xian Ke, Matthew Wilkerson |
Typing Patterns: A Key to User Identification. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification |
27 | Lifeng Lai, Hesham El Gamal, H. Vincent Poor |
Authentication Over Noisy Channels. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Wei-Min Shi |
ID-Based Non-interactive Deniable Authentication Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Janani C. Sriram, Minho Shin, Tanzeem Choudhury, David Kotz |
Activity-aware ECG-based patient authentication for remote health monitoring. |
ICMI |
2009 |
DBLP DOI BibTeX RDF |
security, mobile computing, biometrics, ECG |
27 | Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li 0001, Yunhao Liu 0001 |
Randomizing RFID Private Authentication. |
PerCom |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver |
A new mutual authentication protocol for GSM networks. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hua Wang, Yao Guo 0001, Xiangqun Chen |
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed |
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Minghui Shi, Khaled Hatem Almotairi, Xuemin Shen, Jon W. Mark, Dongmei Zhao, Bruno R. Preiss |
Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Stanislaw Jarecki, Xiaomin Liu |
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ming-Chin Chuang, Jeng Farn Lee |
LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen 0001 |
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. |
Euro-Par |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen |
A Location Privacy Preserving Authentication Scheme in Vehicular Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | M. N. Doja 0001, Naveen Kumar 0008 |
Image Authentication Schemes against Key-Logger Spyware. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang |
An Identity-Based Authentication Model for Multi-domain in Grid Environment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Hou Huifang, Ji Xinshen, Liu Guangqiang |
A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Hou Huifang, Kaizhi Huang, Liu Guangqiang |
CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yanfei Liu |
An Efficient RFID Authentication Protocol for Low-Cost Tags. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Steven Gordon |
Formal Analysis of PANA Authentication and Authorisation Protocol. |
PDCAT |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sébastien Marcel, José del R. Millán |
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2007 |
DBLP DOI BibTeX RDF |
biometry, machine learning, signal processing, electroencephalogram, probabilistic algorithms, Emerging technologies |
27 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Andreas Roos, Sabine Wieland, A. Th. Schwarzbacher, Bangnan Xu |
Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Bogdan Groza, Toma-Leonida Dragomir |
On the use of one-way chain based authentication protocols in secure control systems. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Leila Ismail |
Authentication Mechanisms for Mobile Agents. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
PKI-Based Authentication Mechanisms in Grid Systems. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Wei Zhang 0060, Yonghe Liu, Sajal K. Das 0001 |
Aggregation Supportive Authentication in Wireless Sensor Networks: A Watermark Based Approach. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rosa R. Heckle, Wayne G. Lutters |
Privacy implications for single sign-on authentication in a hospital environment. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis |
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Phillip L. Hellewell, Kent E. Seamons |
Extensible Pre-authentication Kerberos. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Weidong Shi, Hsien-Hsin S. Lee |
Authentication Control Point and Its Implications For Secure Processor Design. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Fumiko Satoh, Yuichi Nakamura 0003, Koichi Ono |
Adding Authentication to Model Driven Security. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, Sozo Inoue, Hiroto Yasuura |
On Authentication between Human and Computer. |
PerCom Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jong-Hyouk Lee, Tai-Myoung Chung |
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mehmet A. Orgun, Ji Ma 0001, Chuchang Liu, Guido Governatori |
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Eric Simpson, Patrick Schaumont |
Offline Hardware/Software Authentication for Reconfigurable Platforms. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Seung Wook Jung, Souhwan Jung |
Secure Password Authentication for Distributed Computing. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, Yan Solihin |
Improving Cost, Performance, and Security of Memory Encryption and Authentication. |
ISCA |
2006 |
DBLP DOI BibTeX RDF |
|
27 | William Eric Hall, Charanjit S. Jutla |
Parallelizable Authentication Trees. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Flávio Oliveira Silva 0001, João A. A. Pacheco, Pedro Frosi Rosa |
A Web Service Authentication Control System Based on SRP and SAML. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Hyungmo Kang, Youngsong Mun |
Authentication in Fast Handover of Mobile IPv6 Applying AAA by Using Hash Value. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
|
27 | HyunGon Kim, ByeongKyun Oh |
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
prepaid, authorization, Mobile IPv6, Mobile node |
27 | Wei Liang, Wenye Wang |
A quantitative study of authentication and QoS in wireless IP networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang |
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li |
A Dynamic Face and Fingerprint Fusion System for Identity Authentication. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. |
ICADL |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Bruce Christianson |
Anonymous Authentication (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
A2cast: an adaptive source authentication protocol for multicast streams. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Chang-Joo Moon, Dae-Ha Park |
A User Authentication Model for the OSGi Service Platform. |
AsiaSim |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum |
Symmetric Key Authentication Services Revisited. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Xin Zhao 0016, Atul Prakash 0001 |
Source Authentication in Group Communication Systems. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Sung-Cheal Byun, Sang-Kwang Lee, Ahmed H. Tewfik, Byung-Ha Ahn |
A SVD-Based Fragile Watermarking Scheme for Image Authentication. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Satoshi Ohzahata, Shigetomo Kimura, Yoshihiko Ebihara |
A Fast Authentication Method for Secure and Seamless Handoff. |
ICOIN (2) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Moni Naor |
Deniable Ring Authentication. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Tim Ebringer, Peter Thorne, Yuliang Zheng 0001 |
Parasitic Authentication To Protect Your E-Wallet. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Michael Roe |
Authentication and Naming (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Joshua D. Guttman, F. Javier Thayer |
Authentication Tests. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Ralf C. Hauser, E. Stewart Lee |
Verification and Modelling of Authentication Protocols. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
27 | Atefeh Mashatan, Douglas R. Stinson |
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Two-channel cryptography, Authenticated channel, Hash functions, Message authentication |
27 | Michael S. Kirkpatrick, Elisa Bertino |
Physically restricted authentication with trusted hardware. |
STC |
2009 |
DBLP DOI BibTeX RDF |
authentication, discrete logarithm, zero-knowledge proof, physical unclonable functions, applied cryptography |
27 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed |
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, RFID, robust, recovery |
27 | Gyözö Gódor, Sándor Imre |
Performance analysis of the simple lightweight authentication protocol. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
lightweight protocol, authentication, RFID |
27 | Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee |
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Home Network, Roaming |
27 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
clustering, ad-hoc networks, authentication, trust, fuzzy control |
27 | Ming Ki Chong, Gary Marsden |
Exploring the Use of Discrete Gestures for Authentication. |
INTERACT (2) |
2009 |
DBLP DOI BibTeX RDF |
gesture passwords, discrete gestures, User authentication |
27 | Christophe Tartary |
Ensuring Authentication of Digital Information Using Cryptographic Accumulators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel |
27 | Florian Kerschbaum, Alessandro Sorniotti |
RFID-based supply chain partner authentication and key agreement. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
proof of possession, authentication, supply chain, key agreement, rfid |
27 | Gábor Fehér, István Oláh |
Enhancing wireless video streaming using lightweight approximate authentication. |
Multim. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Approximate authentication, Security, QoS, Wireless video streaming, Error resilient video coding |
27 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
27 | Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi |
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
seamless roaming, ubiquitous mobility, authentication, heterogeneous networks |
27 | Bezawada Bruhadeshwar, Kishore Kothapalli |
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. |
ICDCN |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Collusion resistance |
27 | Manik Lal Das, V. Lakshmi Narasimhan |
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Hash function, Password, Key agreement, Non-monotonic logic |
27 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
27 | Sascha Zmudzinski, Martin Steinebach |
Psycho-acoustic model-based message authentication coding for audio data. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
authentication watermarking, psycho-acoustic modelling, audio fingerprinting, perceptual hash, robust hash |
27 | Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das 0001, Deepsikha Debnath |
Handwritten Signature Authentication Using Statistical Estimation. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
mean variance, Security, authentication, biometric, watermarking, image analysis |
27 | Kyu-Hwan Lee, Jae-Hyun Kim, Jun-Hee Park, Dong-Hee Kim, Kyung-Duk Moon |
Routing based authentication for mobile ad hoc network in home environment. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
security, mobile ad-hoc network, authentication, home network, secure routing |
27 | Slawomir Grzonkowski, Wojciech Zaremba, Maciej Zaremba, Bill McDaniel |
Extending web applications with a lightweight zero knowledge proof authentication. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
web 2.0 authentication, protocols, web 2.0, password, graph isomorphism, zero knowledge proof |
27 | Yong-Dong Zhang 0001, Sheng Tang, Jin-Tao Li 0001 |
Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
PCA (Principal Component Analysis), Hotelling’s T-square statistic, digital signature, image authentication |
27 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission |
27 | Ye Chen, Divakaran Liginlal |
Bayesian Networks for Knowledge-Based Authentication. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
knowledge-based authentication, Security, simulation, metrics, Bayesian networks, entropy, information theory |
27 | Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt |
Unconditionally secure ring authentication. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
ring signature, unconditional security, authentication codes |
27 | Lanlan Hu, Yixian Yang, Xinxin Niu |
Improved Remote User Authentication Scheme Preserving User Anonymity. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymity, Smart cards |
27 | Rehan Akbani, Turgay Korkmaz, G. V. S. Raju 0001 |
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks. |
SpringSim (1) |
2007 |
DBLP BibTeX RDF |
security, MANETs, mobile ad-hoc networks, authentication, HEAP |
27 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Key agreement |
27 | Hyun Seok Kim, Jin-Young Choi |
The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
Model Checking, RFID, Authentication Protocol |
27 | Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon |
An evolutionary keystroke authentication based on ellipsoidal hypothesis space. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
keystroke biometrics, biometric authentication, keystroke dynamics, identity verification |
27 | Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
Anonymous Authentication Scheme for Subscription Services. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymity, privacy preservation, group signature, linkability |
Displaying result #301 - #400 of 25398 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|